Security of Services Clause Samples

The 'Security of Services' clause establishes the obligation of a service provider to implement and maintain appropriate security measures to protect the services being delivered. This typically involves requirements such as safeguarding data, preventing unauthorized access, and adhering to industry standards or specific security protocols. By clearly defining these responsibilities, the clause helps ensure that sensitive information and systems remain protected, thereby reducing the risk of data breaches and enhancing trust between the parties.
Security of Services. Everbridge’s IT security and compliance program includes the following industry standards generally adopted by U.S. based SaaS providers: (i) reasonable and appropriate technical, organizational and security measures against the destruction, loss, unavailability, unauthorized access or alteration of Client Data in the possession or under the control of Everbridge, including to ensure the availability of information following interruption to, or failure of, critical business processes; and (iii) a third party audit of its security controls as provided in the “Privacy and Security Compliance” link on ▇▇▇.▇▇▇▇▇▇▇▇▇▇.▇▇▇. “Privacy Laws” means all state and federal laws and regulations regarding data protection and privacy.
Security of Services. The customer is wholly responsible for the safety and security of their DWD Telecoms account, and the equipment used by them to access the DWD Telecoms network and services and must put in place such safeguards as necessary to prevent unauthorised use. The customer is responsible for all persons who use their username and password to access the service, whether authorised or not. DWD Telecoms accepts no responsibility for costs incurred by the customer from unauthorised usage of a customer's account.
Security of Services. Everbridge’s IT security and compliance program includes the following industry standards generally adopted by U.S. based SaaS providers: (i) reasonable and appropriate technical, organizational and security measures against the destruction, loss, unavailability, unauthorized access or alteration of Client Data in the possession or under the control of Everbridge, including to ensure the availability of information following interruption to, or failure of, critical business processes; and (iii) a third party audit of its security controls as provided in the “Privacy and Security Compliance” link on ▇▇▇.▇▇▇▇▇▇▇▇▇▇.▇▇▇. SLG Core Platform Service Agreement v5 lkd 5.26.15 1
Security of Services. 3.1 The Customer recognizes the copyright of JAKOB in and to the works (training documents, etc.) created by JAKOB. The reproduction and/or distribution of the above-mentioned works by the Customer shall be subject to the prior written consent of JAKOB. 3.2 JAKOB represents that the works provided by it for the realization of the order do not conflict with copyrights and/or other rights of third parties. 3.3 Before and during the training activities, the Customer shall constantly inform JAKOB on all conditions and circumstances relevant to the preparation and realization of the order. The Customer shall nominate a responsible contact person. 3.4 Unless stipulated otherwise, JAKOB shall have the right to subsequently offer its services also to competitors of the Customer.

Related to Security of Services

  • Security of Data a. Each of the parties shall: i. ensure as far as reasonably practicable, that Data is properly stored, is not accessible to unauthorised persons, is not altered, lost or destroyed and is capable of being retrieved only by properly authorised persons; ii. subject to the provisions of Sub-Clause 8.a. ensure that, in addition to any security, proprietary and other information disclosure provision contained in the Contract, Messages and Associated Data are maintained in confidence, are not disclosed or transmitted to any unauthorised person and are not used for any purpose other than that communicated by the sending party or permitted by the Contract; and iii. protect further transmission to the same degree as the originally transmitted Message and Associated Data when further transmissions of Messages and Associated Data are permitted by the Contract or expressly authorised by the sending party. b. The sending party shall ensure that Messages are marked in accordance with the requirements of the Contract. If a further transmission is made pursuant to Sub-Clause 3. a. iii. the sender shall ensure that such markings are repeated in the further transmission. c. The parties may apply special protection to Messages by encryption or by other agreed means, and may apply designations to the Messages for protective Interchange, handling and storage procedures. Unless the parties otherwise agree, the party receiving a Message so protected or designated shall use at least the same level of protection and protective procedures for any further transmission of the Message and its Associated Data for all responses to the Message and for all other communications by Interchange or otherwise to any other person relating to the Message. d. If either party becomes aware of a security breach or breach of confidence in relation to any Message or in relation to its procedures or systems (including, without limitation, unauthorised access to their systems for generation, authentication, authorisation, processing, transmission, storage, protection and file management of Messages) then it shall immediately inform the other party of such breach. On being informed or becoming aware of a breach the party concerned shall: i. immediately investigate the cause, effect and extent of such breach; ii. report the results of the investigation to the other party; and iii. use all reasonable endeavours to rectify the cause of such breach. e. Each party shall ensure that the contents of Messages that are sent or received are not inconsistent with the law, the application of which could restrict the content of a Message or limit its use, and shall take all necessary measures to inform without delay the other party if such an inconsistency arises.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Physical Security of Media DST shall implement controls, consistent with applicable prevailing industry practices and standards, that are designed to deter the unauthorized viewing, copying, alteration or removal of any media containing Fund Data. Removable media on which Fund Data is Schedule 10.2 p.3 stored by DST (including thumb drives, CDs, and DVDs, and PDAS) will be encrypted based on DST encryption policies.